presentación de nextel s.a. -...
TRANSCRIPT
R&D&i
Agustín Moyano
Product Manager & Security Consultant
Infoday Nacional H2020-SEC-2016-CIB
2016/03/08
Presentation
We design quality projects of Telematics
Engineering and IT Consulting
We specialize in Information Security. We will assist you to achieve it.
Presentation
The Trust is one of
the values we promote
within and
outside Nextel SA,
which improves the
team, relationships
with technology
partners and the
loyalty of our
customers.
Presentation
We think globally: 360º IT Solution
Nextel S.A. can assist you in finding a comprehensive telematics engineering solution in order to optimize your company’s resources to their fullest. We will perform an evaluation of your company and put forth the most suitable solution to simplify the development of your work by boosting your company’s business model.
1. IT Consultancy
2. Systems Integration
3. Maintenance and Outsourcing
Services
Cloud Computing
360º IT Solution
Electronic Evidence
Business Continuity
Telematic Engineering Critical Infrastructures
e-Administration
ENS
ENI
Service Desk
Ethical Hacking
IT Security
CyberSecurity
Cloud ENS
Cyber CSI
Services
IT Quality
IT Gobernance
ISO 27001
ISO 20000
LOPD Maintenance
IT Consultancy
Systems Integration
Outsourcing ISO 28000
Law Compliance
IT Service Management Corporate Compliance
NextRisk
Innovation
Risk
management
Electronic evidence management
Operational
Security
Assurance
Access
Control
INTEROPERABLE IAM & DYNAMIC
AUTHORIZATION CHAIN
NETWORKING, SDN & NFV
SEMANTICSENSOR NETWORK and IoT
BIG DATA TREATMENT, ANALYSIS AND
REASONING
COMPLEX EVENT PROCESSING
DATA SCHEMAS, GRANULARITY AND
LINKED DATA
DISTRIBUTED STORAGE
DISTRIBUTED COMPUTING
PROGRAMING
VIRTUALIZATION STACK
Security Monitoring
Cloud
/Fogg
Isolation
Efficiency
Resilience
Security
Inspection &
detection
Hardening
CiberSecurity: IoT and BigData
Availability – Integrity – Confidenciality – Authentication - Traceability
TIC Investment & Security
NEXTRISK
Integral Hazard Prevention Platform
Industrial Protection
Work safety Protection Phisical Access Protection CCTV
Alarm Management …
IT Prevention
OT Prevention
BIG DATA
Other sources
Security assurance
Security assurance: operational checks
Inherent risks for the Service
Identified risks for the Service
Security Policy
Security Controls realisation
Procedures and Technical mechanisms enforcing or supporting security controls
Op
era
tio
nal
syst
em Running Security Controls
OK OK OK NOK
Security Controls realisationis running as expectedin the operational system
Ris
kA
sse
ssm
en
t
De
sign
&
Imp
lem
en
tati
on
Security Architecture
Accepted risks
Implementation gap (CC evaluation scope)
Application gap (BUGYO evaluation scope)
Integral access control
Access control: physical and logical integration
Conclusions
Salud Energía
Agua Transporte Financiero
CyberSecurity IoT & Big Data
Access Control
Sensing Network
Conclusions
Sensing devices manufacturer
End users
+
¡Eskerrik Asko!
Follow us
Infoday Nacional H2020-SEC-2016-CIB
2016/03/08
Thank you!
¡Mucha gracias!